2020
DOI: 10.11591/ijeecs.v20.i2.pp924-931
|View full text |Cite
|
Sign up to set email alerts
|

Reliable data transmission: An IoT health-based paradiam

Abstract: <p>A WBAN can be spread over a person's body, so; posing, dressing, moving of muscles, degree of heat of bodies as well as weather changes in general affect connections among sensors as well as desired point. Secondly, information collected via every sensor can be connected to a person's course of life; so, it can be considered as significant to guarantee that the collected information ought to be given to desired point competently. In this work, a critical cooperating communicating protocol to WBAN esta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…Further, there are studies towards improving the overall performance of data transmission operation in WSN viz. adoption of distributed coordinated function (Abdel-Ameer et al [36]), IoT-based data transmission with reliability (Hammood et al [37]), swarm-intelligence based supportability (Altmemi and Yaseen [38]), adoption of neural network in motes (Mispan et al [39]), congestion scheme with data transmission (Shukur [40]), public key encryption usage (Mohamad et al [41]), clustering routing scheme (Alnajdi and Bajaber [42]), effect of fading in communication (Jadhav et al [43]).…”
Section: Introductionmentioning
confidence: 99%
“…Further, there are studies towards improving the overall performance of data transmission operation in WSN viz. adoption of distributed coordinated function (Abdel-Ameer et al [36]), IoT-based data transmission with reliability (Hammood et al [37]), swarm-intelligence based supportability (Altmemi and Yaseen [38]), adoption of neural network in motes (Mispan et al [39]), congestion scheme with data transmission (Shukur [40]), public key encryption usage (Mohamad et al [41]), clustering routing scheme (Alnajdi and Bajaber [42]), effect of fading in communication (Jadhav et al [43]).…”
Section: Introductionmentioning
confidence: 99%